ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010最新文献

筛选
英文 中文
3D object modeling using multi-mother wavelet network 基于多母小波网络的三维物体建模
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5586961
Mohamed Othmani, W. Bellil, C. Amar, A. Alimi
{"title":"3D object modeling using multi-mother wavelet network","authors":"Mohamed Othmani, W. Bellil, C. Amar, A. Alimi","doi":"10.1109/AICCSA.2010.5586961","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586961","url":null,"abstract":"This paper deals with an experiment which proves that wavelet networks are capable for 3D objects modeling. To prove this, we will propose a new structure of wavelet network founded on several mother wavelets families. This new structure is in some ways similar to the classic wavelet networks but it admits some originality. Actually, wavelet network basically uses dilations and translations versions of only one mother wavelet to construct the network. The proposed structure uses several mother wavelets, in order to maximize best wavelets selection probability. An algorithm to construct this structure is presented. First, 3D object model vertices and their corresponding normal values are used to create a training set. Then, an improved Orthogonal Least Squares method version is applied to optimize wavelet selection for every mother wavelet. Some simulation results will describe the proposed wavelet network performance employing several types of Polywogs as mother wavelets.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Decentralized resource management using a borrowing schema 使用借用模式的分散资源管理
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5586980
Narkoy Batouma, J. Sourrouille
{"title":"Decentralized resource management using a borrowing schema","authors":"Narkoy Batouma, J. Sourrouille","doi":"10.1109/AICCSA.2010.5586980","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586980","url":null,"abstract":"Resource management is a main issue when distributed applications should meet some Quality of Service (QoS) constraints. Centralized approaches are widely used for many good reasons, but decentralized approaches are often more reliable. A local view of the system from a node is not sufficient to make sound decisions. To synchronize their actions, nodes must exchange data with each other. Exchanging data incurs a cost; hence, to reduce the amount of exchanged data is desirable. This paper presents a distributed middleware to manage resources in a decentralized manner, using an approximate scheduling and a resource-borrowing scheme to improve the total QoS of the system. On each node, managers construct a comprehensive view of resource availability in the whole system. Our borrowing scheme aims to guarantee that as many applications as possible meet their deadline, to reject as few applications as possible, while decreasing the exchange costs and increasing the use of resources. Simulations show the usefulness of the approach and give encouraging results.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An efficient source authentication scheme in wireless sensor networks 一种有效的无线传感器网络源认证方案
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5586993
Wafa Ben Jaballah, A. Meddeb, H. Youssef
{"title":"An efficient source authentication scheme in wireless sensor networks","authors":"Wafa Ben Jaballah, A. Meddeb, H. Youssef","doi":"10.1109/AICCSA.2010.5586993","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586993","url":null,"abstract":"Wireless sensor networks (WSN) are being widely deployed in military, healthcare and commercial environments. Since sensor networks pose unique challenges, traditional security methods, commonly used in enterprise networks, cannot be directly applied. In particular, broadcast source authentication is a critical security service in wireless sensor networks since it allows senders to broadcast messages to multiple receivers in a secure way. Public-key cryptography based solutions such as Elliptic Curve Cryptography (ECC) and Identity Based Cryptography (IBC) have been proposed but they all suffer from severe energy depletion attacks, resulting from a high computational and communication overheads. In this paper, we present a novel symmetric-key-based authentication scheme that exhibits low broadcast authentication overhead and thus avoiding the problem flaws inherent to the public key cryptography based schemes. Our scheme is built upon the integration of multi-level μTesla protocol, staggered authentication and the Bloom Filter. We show that our authentication scheme is very efficient in terms of energy consumption related to both computation and communication.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Freshness-aware metadata management: Performance evaluation with SWN models 新鲜度感知元数据管理:使用SWN模型进行性能评估
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5586954
O. Diallo, M. Sene, Idrissa Sarr
{"title":"Freshness-aware metadata management: Performance evaluation with SWN models","authors":"O. Diallo, M. Sene, Idrissa Sarr","doi":"10.1109/AICCSA.2010.5586954","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586954","url":null,"abstract":"Recent systems which are in general composed by several resources and distributed over a large-scale network, need high-level models to be studied. In these complex systems such as peer-to-peer systems, efficient and fast query routing is necessary for managing applications workload. Many works have been proposed to deal with query routing, however none of these studies rely on Stochastic Well formed Petri Nets (SWN) for modelling the approach proposed. We aim in this paper, to propose an algorithm for managing metadata needed to route queries. Moreover we use SWN models to evaluate and validate our approach. Our solution is freshness-aware, thus gains in the fact that stale data can be read under some limits. These limits are wideley taken into account for managing metadata coherently. Our study takes into account the concurrency, the synchronization, the parallelism, the identity of the resources and their cooperation. We propose two SWN models for structuring metadata: one with strong consistency and another with weak consistency. Simulations are used to validate our approach and the results obtainded demonstrate the fesability of our solution.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Architecture conformance checking of multi-language applications 多语言应用程序的体系结构一致性检查
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5587025
Razieh Rahimi, R. Khosravi
{"title":"Architecture conformance checking of multi-language applications","authors":"Razieh Rahimi, R. Khosravi","doi":"10.1109/AICCSA.2010.5587025","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587025","url":null,"abstract":"As the development in a software project goes on, the structure of the implemented code diverges from the intended architecture. To prevent this, architecture conformance methods are used to check if the source code complies with the architecture. In the development of today's enterprise applications, general-purpose programming languages are used along with a number of domain specific languages. So, there is a need for a conformance checking method to support multi-language source artifacts. We present a model-based approach for checking cross-language architecture conformance rules. Our method is extensible, in the sense that it is independent of the specific set of languages used in the project.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114310460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application of Pruned Bilinear Recurrent Neural Network to load prediction 双线性递归神经网络在负荷预测中的应用
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5586969
Jae-Young Kim, Dong-Chul Park, Dong-Min Woo
{"title":"Application of Pruned Bilinear Recurrent Neural Network to load prediction","authors":"Jae-Young Kim, Dong-Chul Park, Dong-Min Woo","doi":"10.1109/AICCSA.2010.5586969","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586969","url":null,"abstract":"Prediction of electric load by using Pruned Bilinear Recurrent Neural Network (PBRNN) is proposed and presented in this paper. The PBRNN was developed to alleviate the computational cost associated with the Bilinear Recurrent Neural Network by using a pruning procedure. Since electric loads have a time-series characteristic, a prediction scheme based on the PBRNN can be an optimal candidate for the electric load prediction problem. Experiments are conducted on a load data set from the North-American Electric Utility (NAEU). Results show that the Pruned BRNN-based prediction scheme outperforms the conventional Multi- Layer Perceptron Type Neural Network (MLPNN) in terms of the Mean Absolute Percentage Error(MAPE).","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feedback architecture for multimedia systems 多媒体系统的反馈体系结构
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5587035
B. Alaya, Claude Duvallet, B. Sadeg
{"title":"Feedback architecture for multimedia systems","authors":"B. Alaya, Claude Duvallet, B. Sadeg","doi":"10.1109/AICCSA.2010.5587035","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587035","url":null,"abstract":"Multimedia applications usually manage large quantities of data in the form of frames of certain types. To ensure a flowing traffic of these frames through the network, temporal constraints must be respected when sending and receiving these frames. If the temporal constraints are not met, then the quality of service (QoS) provided to users decreases. In this paper, we exploit some results obtained in QoS management in Real-Time Databases Systems (RTDBSs), and we apply them to multimedia applications, because of similarities existing between these two fields. We propose a new method allowing to control the QoS provided to clients according to the system congestion. To this purpose, we implement a feedback architecture into a master server, allowing us to adapt the quality of service in the distributed multimedia system according to the network state.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Management scheme for intelligent terminals for the information super-highways 信息高速公路智能终端管理方案
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5586991
H. El-Gendy, O. Ibrahim, Nabil El-Kadhi, N. Debnath
{"title":"Management scheme for intelligent terminals for the information super-highways","authors":"H. El-Gendy, O. Ibrahim, Nabil El-Kadhi, N. Debnath","doi":"10.1109/AICCSA.2010.5586991","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586991","url":null,"abstract":"An IN (Intelligent Networks) management scheme for ISO Interface is presented in this paper. The interface is for interactions, via services called Input/Output Services, between desktop applications and voice terminals. These services allow computer applications to provide users with enhanced services by exploitation of the characteristics of a variety of telephony device types. This is by interacting with a switch-based software object, called Information-Path, associated with the device that allows input to be received from the device and output to be sent to the device. The management scheme is suitable for multimedia interactive telecommunications. It covers applications that involve only voice calls (ISDN B channel), only data calls (ISDN D channel), and both voice calls and data calls (both ISDN B channel and ISDN D channel). So, it is suitable for multimedia communications that involve voice, data, and graphics. The applicability is demonstrated by applications scenarios that involve multimedia mail.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126961190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud Computing - an IT paradigm changer 云计算——IT范式的改变者
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5587050
Mazin S. Yousif
{"title":"Cloud Computing - an IT paradigm changer","authors":"Mazin S. Yousif","doi":"10.1109/AICCSA.2010.5587050","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587050","url":null,"abstract":"Cloud Computing is an emerging computing paradigm envisioned to change all IT landscape facets including technology, business, services and human resources. It is a consumer/delivery model that offers IT capabilities as services, billed based on usage. Many such cloud services can be envisioned, but the leading ones are IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), and SaaS (Software-as-a-Service).","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-time execution models for co-simulation 联合仿真的实时执行模型
ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010 Pub Date : 2010-05-16 DOI: 10.1109/AICCSA.2010.5586968
Cyril Faure, N. Pernet
{"title":"Real-time execution models for co-simulation","authors":"Cyril Faure, N. Pernet","doi":"10.1109/AICCSA.2010.5586968","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586968","url":null,"abstract":"In order to reduce development cycle, powertrain control and optimization is increasingly based on system modeling and several steps of simulation are needed. As an intermediate step, real-time simulation aim to prepare further test bed validations embedding the actual engine. This article discusses the challenge to find a real-time execution model offering the determinism needed to maintain the numerical results observed in offline simulation and still managing to meet real-time constraints. We first propose a conservative real-time execution model, totally deterministic but pessimistic in term of computational resources management. Then, since we need better use of these resources in order to achieve real-time simulation of representative complex models, we present different alternatives and discuss the advantages and drawbacks of each of them.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信